Описание
Multiple serious vulnerabilities have been found in Internet Explorer. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges or obtain sensitive information.
Below is a complete list of vulnerabilities
- Improper memory objects access at VBScript and JScript engines and other unknown vectors can be exploited remotely via a specially designed web content to execute arbitrary code;
- Improper permissions validation can be exploited remotely via a specially designed web content;
- Improperly information disclosure can be exploited remotely via a specially designed web content to obtain sensitive information;
- Improper files interaction can be exploited via an unknown vectors to delete local files.
Technical details
Vulnerability (2) doesn’t itself allow arbitrary code execution but combined with another vulnerability could be exploited to run arbitrary code with elevated privileges.
Exploitation of vulnerability (3) could lead to disclosure of memory content.
(4) caused by accessing files with improper flag and can lead low privilege process to delete arbitrary files.
Первичный источник обнаружения
- CVE-2015-2483
CVE-2015-2493
CVE-2015-2492
CVE-2015-2490
CVE-2015-2501
CVE-2015-2494
CVE-2015-2500
CVE-2015-2489
CVE-2015-2541
CVE-2015-2542
CVE-2015-2491
CVE-2015-2499
CVE-2015-2498
CVE-2015-2486
CVE-2015-2485
CVE-2015-2484
CVE-2015-2487
Связанные продукты
Список CVE
- CVE-2015-2483 critical
- CVE-2015-2493 critical
- CVE-2015-2492 critical
- CVE-2015-2490 critical
- CVE-2015-2501 critical
- CVE-2015-2494 critical
- CVE-2015-2500 critical
- CVE-2015-2489 warning
- CVE-2015-2541 critical
- CVE-2015-2542 critical
- CVE-2015-2491 critical
- CVE-2015-2499 critical
- CVE-2015-2498 critical
- CVE-2015-2486 critical
- CVE-2015-2485 critical
- CVE-2015-2484 high
- CVE-2015-2487 critical
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com